An inventory compliance system includes an rfid reader having an agent configured to periodically read all rf tags within its range and then send the resulting tag information to an inventory application that processes the received information (e.g., tag ID, etc.) to determine the state of inventory at that time—i.e., the number, type, and location of each of the tags. In this way, through automatic updating via mobile and stationary rfid readers, an organization is able to monitor inventory without manual intervention, thereby reducing cost and time associated with conventional inventory compliance methods.
|
8. An rfid reader comprising an agent configured to automatically and intermittently instruct the rfid reader to acquire tag information from a plurality of rf tags that are within a range and then transmit the tag information over a network to an inventory application, wherein the rfid reader is configured to operate in a first mode comprising conventional operation where the rfid reader acquires tags substantially continuously or based upon user input and in a second mode where the agent is configured to operate the rfid reader when the rfid reader is not being used for another task, and wherein the rfid reader is not synchronized with the tags in the second mode prior to acquiring the tag information.
1. An inventory compliance system comprising:
a plurality of rf tags associated with a respective plurality of assets within an environment;
an inventory application coupled to a network;
a plurality of rfid readers provided within the environment, each having a range, wherein each of the rfid readers comprises an agent configured to periodically, in an intermittent fashion, instruct the rfid reader to acquire tag information from those rf tags that are within the range and then transmit the tag information over the network to the inventory application;
wherein each of the plurality of rfid readers is configured to operate in a first mode comprising conventional operation where an rfid reader acquires tags substantially continuously or based upon user input and in a second mode where the agent is configured to operate the rfid reader when the rfid reader is not being used for another task, and wherein the rfid reader is not synchronized with the tags in the second mode prior to acquiring the tag information.
13. A method for determining the state of inventory for a plurality of assets having a plurality of associated rf tags associated therewith, the method comprising:
providing a plurality of rfid readers, each configured to respond to a request to acquire tag information from a set of the rf tags within its range, wherein each of the plurality of rfid readers is configured to operate in a first mode comprising conventional operation where an rfid reader acquires tags substantially continuously or based upon user input and in a second mode where an agent is configured to operate the rfid reader when the rfid reader is not being used for another task, and wherein the rfid reader is not synchronized with the tags in the second mode prior to acquiring the tag information;
in the second mode, intermittently and automatically sending to the rfid readers a request to acquire tag information;
sending the acquired tag information over a network to an inventory application;
determining the location of the set of the rf tags; and
determining the state of inventory based on the tag information and the location of the set of the rf tags.
2. The inventory compliance system of
3. The inventory compliance system of
4. The inventory system of
5. The inventory compliance system of
6. The inventory compliance system of
7. The inventory compliance system of
11. The rfid reader of
12. The inventory compliance system of
14. The method of
15. The method of
16. The method of
17. The method of
18. The method of
19. The inventory compliance system of
a wireless switch coupled to the network and located between the inventory application and the plurality of rfid readers, wherein stationary rfid readers of the plurality of rfid readers are coupled to the wireless switch via the network; and
a access point coupled to the network and the wireless switch, the access point configured to communicate with mobile rfid readers of the plurality of rfid readers;
wherein the wireless switch is configured to monitor and control the plurality of rfid readers and to communicatively coupled the plurality of rfid readers to the inventory application or one or more enterprise applications.
20. The inventory compliance system of
|
The present invention relates generally to radio frequency identification (RFID) systems, wireless local area networks (WLANs), and other such networks incorporating RF tags, and, more particularly, to methods of determining the location of RF tags and associated assets.
Radio frequency identification (RFID) systems have achieved wide popularity in a number of applications, as they provide a cost-effective way to track the location of a large number of assets in real time. In large-scale applications such as warehouses, retail spaces, and the like, many types of tags may exist in the environment. Likewise, multiple types of readers, such as RFID readers, active tag readers, 802.11 tag readers, Zigbee tag readers, etc., are typically distributed throughout the space in the form of entryway readers, conveyer-belt readers, mobile readers, etc., and may be linked by network controller switches and the like. Similarly, there has been a dramatic increase in demand for mobile connectivity solutions utilizing various wireless components and wireless local area networks (WLANs). This generally involves the use of wireless access points that communicate with mobile devices using one or more RF channels (e.g., in accordance with one or more of the IEEE 802.11 standards).
Notwithstanding these advances, inventory compliance (i.e., the tracking of inventory types, quantities, and locations) remains a significant challenge. Conventionally, inventory updates are provided by manually scanning the barcodes and/or RF tags associated with assets, along with barcodes or RF tags associated with the physical location of those assets (e.g., shelf tags, etc.). This manual process is time-consuming and labor-intensive.
Accordingly, it is desirable to provide improved methods and systems for tracking inventory and associated RF tags. Furthermore, other desirable features and characteristics of the present invention will become apparent from the subsequent detailed description and the appended claims, taken in conjunction with the accompanying drawings and the foregoing technical field and background.
The present invention provides systems and methods for an RFID reader that includes an agent configured to periodically read all RF tags within its range and then send the resulting tag information to an inventory application that processes the received information (e.g., tag ID, etc.) to determine the state of inventory at that time—i.e., the number, type, and location of each of the tags. In this way, through automatic updating via mobile and stationary RFID readers, an organization is able to monitor inventory without manual intervention, thereby reducing cost and time associated with conventional inventory compliance methods.
A more complete understanding of the present invention may be derived by referring to the detailed description and claims when considered in conjunction with the following figures, wherein like reference numbers refer to similar elements throughout the figures.
The present invention generally relates to a method for automatically updating inventory information through the periodic scanning, by stationary and mobile RFID readers, of RF tags in an environment. In this regard, the following detailed description is merely illustrative in nature and is not intended to limit the invention or the application and uses of the invention. Furthermore, there is no intention to be bound by any express or implied theory presented in the preceding technical field, background, brief summary or the following detailed description.
The invention may be described herein in terms of functional and/or logical block components and various processing steps. It should be appreciated that such block components may be realized by any number of hardware, software, and/or firmware components configured to perform the specified functions. For example, an embodiment of the invention may employ various integrated circuit components, e.g., radio-frequency (RF) devices, memory elements, digital signal processing elements, logic elements, look-up tables, or the like, which may carry out a variety of functions under the control of one or more microprocessors or other control devices. In addition, those skilled in the art will appreciate that the present invention may be practiced in conjunction with any number of data transmission protocols and that the system described herein is merely one exemplary application for the invention.
For the sake of brevity, conventional techniques related to signal processing, data transmission, signaling, network control, the 802.11 family of specifications, wireless networks, RFID systems and specifications, and other functional aspects of the system (and the individual operating components of the system) may not be described in detail herein. Furthermore, the connecting lines shown in the various figures contained herein are intended to represent example functional relationships and/or physical couplings between the various elements. Many alternative or additional functional relationships or physical connections may be present in a practical embodiment.
Without loss of generality, in the illustrated embodiment, many of the functions usually provided by a traditional access point (e.g., network management, wireless configuration, etc.) and/or traditional RFID readers (e.g., data collection, RFID processing, etc.) are concentrated in a corresponding RF switch. It will be appreciated that the present invention is not so limited, and that the methods and systems described herein may be used in conjunction with traditional access points and RFID readers or any other device that communicates via RF channels.
Referring to
One or more wireless access ports 120 (alternatively referred to as “access ports” or “APs”) are configured to wirelessly communicate with one or more mobile units 130 (or “MUs”). AP 120 suitably communicates with switch 110 via appropriate communication lines 160, 162 (e.g., conventional Ethernet lines, or the like). Any number of additional and/or intervening switches, routers, servers and other network components may also be present in the system.
A number of RF tags (“RFID tags,” or simply “tags”) 104 are distributed throughout the environment. These tags, which may be of various types, are read by a number of RFID readers (or simply “readers”) 108 having one or more associated antennas 106 provided within the environment. The term “RFID” is not meant to limit the invention to any particular type of tag. The term “tag” refers, in general, to any RF element that can be communicated with and has an ID (or “ID signal”) that can be read by another component. In general, RFID tags (sometimes referred to as “transponders”) may be classified as either active, passive, or semi-active. Active tags are devices that incorporate some form of power source (e.g., batteries, capacitors, or the like) and are typically always “on,” while passive tags are tags that are exclusively energized via an RF energy source received from a nearby antenna. Semi-active tags are tags with their own power source, but which are in a standby or inactive mode until they receive a signal from an external RFID reader, whereupon they “wake up” and operate for a time just as though they were active tags. While active tags are more powerful, and exhibit a greater range than passive tags, they also have a shorter lifetime and are significantly more expensive. Such tags are well known in the art, and need not be described in detail herein.
RF Switch 110 determines the destination of packets it receives over networks 160 and 101 and routes those packets to the appropriate AP 120 if the destination is an MU 130 with which the AP is associated. Each WS 110 therefore maintains a routing list of MUs 130 and their associated APs 120. These lists are generated using a suitable packet handling process as is known in the art. Thus, each AP 120 acts primarily as a conduit, sending/receiving RF transmissions via MUs 130, and sending/receiving packets via a network protocol with WS 110.
RF switch 110 can support any number of devices that use wireless data communication protocols, techniques, or methodologies, including, without limitation: RF; IrDA (infrared); Bluetooth; ZigBee (and other variants of the IEEE 802.15 protocol); IEEE 802.11 (any variation); IEEE 802.16 (WiMAX or any other variation); Direct Sequence Spread Spectrum; Frequency Hopping Spread Spectrum; cellular/wireless/cordless telecommunication protocols; wireless home network communication protocols; paging network protocols; magnetic induction; satellite data communication protocols; wireless hospital or health care facility network protocols such as those operating in the WMTS bands; GPRS; and proprietary wireless data communication protocols such as variants of Wireless USB.
Readers 108, each of which may be stationary or mobile, are suitably coupled via wired or wireless data links to RF switch 110, and may have multiple associated antennas 106. Each antenna 106 has an associated RF range (or “read point”) 116, which depends upon, among other things, the strength of the respective antenna 106. The read point 116 corresponds to the area around the antenna in which a tag 104 may be read by that antenna, and may be defined by a variety of shapes, depending upon the nature of the antenna (i.e., the RF range need not be circular or spherical as illustrated in
Referring to
It is not uncommon for RF ranges or read points to overlap in real-world applications (e.g., doorways, small rooms, etc.). Thus, as shown in
As described in further detail below, switch 110 includes hardware, software, and/or firmware capable of carrying out the functions described herein. Thus, switch 110 may comprise one or more processors accompanied by storage units, displays, input/output devices, an operating system, database management software, networking software, and the like. Such systems are well known in the art, and need not be described in detail. Switch 110 may be configured as a general purpose computer, a network switch, or any other such network host. In a preferred embodiment, switch 110 is modeled on a network switch architecture but includes RF network controller software (or “module”) whose capabilities include, among other things, the ability to allow configure and monitor readers 108 and antennas 106.
RF switch 110 includes a cell controller (CC) and an RFID network controller (RNC). In general, the RNC includes hardware and software configured to handle RFID data communication and administration of the RFID network components, while the CC includes hardware and software configured to handle wireless data (e.g., in accordance with IEEE 802.11) from the mobile units and access ports within wireless cells. In one embodiment, RF switch 110 includes a single unit with an enclosure containing the various hardware and software components necessary to perform the various functions of the CC and RNC as well as suitable input/output hardware interfaces to networks 101 and 160.
One or more readers 108 are distributed throughout environment 300. Some may be stationary (and located in known locations), while others may be mobile (hand-held, attached to vehicles, etc.). In accordance with the present invention, one or more of readers 108 include an agent (agent 202 illustrated in
The term “periodic” as used in connection with agent 202 means occurring from time to time, but not necessarily at regular intervals. That is, agent 202 may be configured to read RF tags randomly, regularly, or in any desired manner. In one embodiment, when agent 202 determines that its particular RF reader 108 is not being used for another task, it initiates one or more scans for RF tags and sends the resulting tag information to the inventory application.
Locationing, as performed by the RF switch 110, and as used by inventory application 170, generally involves examining all of the RFID tag data available at a particular time and then using rules and locationing algorithms to determine the most likely location of the tags associated with the tag data. Such locationing typically involves utilizing various ranging techniques to determine symbolic distance or range measurement coupled with position estimation techniques that derive position estimates from collection of reference points and their associated range measurements.
It should be appreciated that the example embodiment or embodiments described herein are not intended to limit the scope, applicability, or configuration of the invention in any way. For example, these methods may be used in connection with standard barcode readers and the like. In general, the foregoing detailed description will provide those skilled in the art with a convenient road map for implementing the described embodiment or embodiments. It should be understood that various changes can be made in the function and arrangement of elements without departing from the scope of the invention as set forth in the appended claims and the legal equivalents thereof.
Rinkes, Charles, Mountjoy, Thomas L., Mohnke, David, Hulthen, Michael
Patent | Priority | Assignee | Title |
10443268, | Dec 12 2012 | Life Technologies Corporation | Self-locking door and product dispensing enclosure having a self-locking door |
10614413, | Oct 24 2014 | Life Technologies Corporation | Inventory management system and method of use |
11182736, | May 01 2017 | WELLS FARGO BANK, N A | System and method for smart inventory capture |
11853964, | May 01 2017 | Wells Fargo Bank, N.A. | System and method for smart inventory capture |
9123016, | Mar 14 2013 | Walmart Apollo, LLC | Method and apparatus pertaining to the use of group RFID tag information |
9310466, | Mar 14 2013 | Walmart Apollo, LLC | Method and apparatus pertaining to the identification of physical-local discrepancies in statistics-based RFID-tag information |
9704124, | Mar 14 2013 | Walmart Apollo, LLC | Method and apparatus pertaining to monitoring item source locations |
9963912, | Dec 12 2012 | Life Technologies Corporation | Self-locking door and product dispensing enclosure having a self-locking door |
Patent | Priority | Assignee | Title |
5887176, | Jun 28 1996 | Randtec, Inc. | Method and system for remote monitoring and tracking of inventory |
20060028352, | |||
20060289648, | |||
20070096909, | |||
20070200701, | |||
20070210923, | |||
20080143482, | |||
20080284600, | |||
20090037244, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 31 2008 | Symbol Technologies, Inc. | (assignment on the face of the patent) | / | |||
Aug 29 2008 | MOHNKE, DAVID | Symbol Technologies, Inc | CORRECTIVE ASSIGNMENT TO CORRECT THE DOCKET NUMBER PREVIOUSLY RECORDED ON REEL 021513 FRAME 0818 ASSIGNOR S HEREBY CONFIRMS THE CORRECT DOCKET NUMBER TO BE 022 0237 | 021632 | /0792 | |
Aug 29 2008 | MOUNTJOY, THOMAS L | Symbol Technologies, Inc | CORRECTIVE ASSIGNMENT TO CORRECT THE DOCKET NUMBER PREVIOUSLY RECORDED ON REEL 021513 FRAME 0818 ASSIGNOR S HEREBY CONFIRMS THE CORRECT DOCKET NUMBER TO BE 022 0237 | 021632 | /0792 | |
Aug 29 2008 | RINKES, CHARLES | Symbol Technologies, Inc | CORRECTIVE ASSIGNMENT TO CORRECT THE DOCKET NUMBER PREVIOUSLY RECORDED ON REEL 021513 FRAME 0818 ASSIGNOR S HEREBY CONFIRMS THE CORRECT DOCKET NUMBER TO BE 022 0237 | 021632 | /0792 | |
Aug 29 2008 | HULTHEN, MICHAEL | Symbol Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021513 | /0818 | |
Aug 29 2008 | MOHNKE, DAVID | Symbol Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021513 | /0818 | |
Aug 29 2008 | MOUNTJOY, THOMAS L | Symbol Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021513 | /0818 | |
Aug 29 2008 | RINKES, CHARLES | Symbol Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021513 | /0818 | |
Aug 29 2008 | HULTHEN, MICHAEL | Symbol Technologies, Inc | CORRECTIVE ASSIGNMENT TO CORRECT THE DOCKET NUMBER PREVIOUSLY RECORDED ON REEL 021513 FRAME 0818 ASSIGNOR S HEREBY CONFIRMS THE CORRECT DOCKET NUMBER TO BE 022 0237 | 021632 | /0792 | |
Oct 27 2014 | Symbol Technologies, Inc | MORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENT | SECURITY AGREEMENT | 034114 | /0270 | |
Oct 27 2014 | Zebra Enterprise Solutions Corp | MORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENT | SECURITY AGREEMENT | 034114 | /0270 | |
Oct 27 2014 | Laser Band, LLC | MORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENT | SECURITY AGREEMENT | 034114 | /0270 | |
Oct 27 2014 | ZIH Corp | MORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENT | SECURITY AGREEMENT | 034114 | /0270 | |
Apr 10 2015 | Symbol Technologies, Inc | Symbol Technologies, LLC | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 036083 | /0640 | |
Jul 21 2015 | MORGAN STANLEY SENIOR FUNDING, INC | Symbol Technologies, Inc | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 036371 | /0738 |
Date | Maintenance Fee Events |
Jun 26 2015 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jun 24 2019 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jun 20 2023 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jan 24 2015 | 4 years fee payment window open |
Jul 24 2015 | 6 months grace period start (w surcharge) |
Jan 24 2016 | patent expiry (for year 4) |
Jan 24 2018 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 24 2019 | 8 years fee payment window open |
Jul 24 2019 | 6 months grace period start (w surcharge) |
Jan 24 2020 | patent expiry (for year 8) |
Jan 24 2022 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 24 2023 | 12 years fee payment window open |
Jul 24 2023 | 6 months grace period start (w surcharge) |
Jan 24 2024 | patent expiry (for year 12) |
Jan 24 2026 | 2 years to revive unintentionally abandoned end. (for year 12) |